General

  • Target

    772-94-0x0000000000360000-0x00000000003EC000-memory.dmp

  • Size

    560KB

  • MD5

    96df21cf6c2f524f169ad6f386181314

  • SHA1

    6ccac6e78b58f6bc12f4b8cde1af6ea79d89251a

  • SHA256

    b8523897fab4d96ca44c6a2c73bcdcba76ae69b6fe0f26a27c5a534bd8237d56

  • SHA512

    6e33476e9f278dad5a9cf9ad908aed3e528db58a727fb27847614d26726f9a4396baa53e6b9756da2337f77a8edbbda06b91a65ae25ec3fddde5a7c5474179fa

  • SSDEEP

    12288:ppr7fRO72VuRyd7bNTHdoGLJOe2Qbh/Vd:pJFQkT9fLJdd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 772-94-0x0000000000360000-0x00000000003EC000-memory.dmp
    .exe windows x86


    Headers

    Sections